123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224 |
- // Copyright 2018 fatedier, fatedier@gmail.com
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package group
- import (
- "net"
- "strconv"
- "sync"
- "github.com/fatedier/frp/server/ports"
- gerr "github.com/fatedier/golib/errors"
- )
- // TCPGroupCtl manage all TCPGroups
- type TCPGroupCtl struct {
- groups map[string]*TCPGroup
- // portManager is used to manage port
- portManager *ports.Manager
- mu sync.Mutex
- }
- // NewTCPGroupCtl return a new TcpGroupCtl
- func NewTCPGroupCtl(portManager *ports.Manager) *TCPGroupCtl {
- return &TCPGroupCtl{
- groups: make(map[string]*TCPGroup),
- portManager: portManager,
- }
- }
- // Listen is the wrapper for TCPGroup's Listen
- // If there are no group, we will create one here
- func (tgc *TCPGroupCtl) Listen(proxyName string, group string, groupKey string,
- addr string, port int) (l net.Listener, realPort int, err error) {
- tgc.mu.Lock()
- tcpGroup, ok := tgc.groups[group]
- if !ok {
- tcpGroup = NewTCPGroup(tgc)
- tgc.groups[group] = tcpGroup
- }
- tgc.mu.Unlock()
- return tcpGroup.Listen(proxyName, group, groupKey, addr, port)
- }
- // RemoveGroup remove TCPGroup from controller
- func (tgc *TCPGroupCtl) RemoveGroup(group string) {
- tgc.mu.Lock()
- defer tgc.mu.Unlock()
- delete(tgc.groups, group)
- }
- // TCPGroup route connections to different proxies
- type TCPGroup struct {
- group string
- groupKey string
- addr string
- port int
- realPort int
- acceptCh chan net.Conn
- index uint64
- tcpLn net.Listener
- lns []*TCPGroupListener
- ctl *TCPGroupCtl
- mu sync.Mutex
- }
- // NewTCPGroup return a new TCPGroup
- func NewTCPGroup(ctl *TCPGroupCtl) *TCPGroup {
- return &TCPGroup{
- lns: make([]*TCPGroupListener, 0),
- ctl: ctl,
- acceptCh: make(chan net.Conn),
- }
- }
- // Listen will return a new TCPGroupListener
- // if TCPGroup already has a listener, just add a new TCPGroupListener to the queues
- // otherwise, listen on the real address
- func (tg *TCPGroup) Listen(proxyName string, group string, groupKey string, addr string, port int) (ln *TCPGroupListener, realPort int, err error) {
- tg.mu.Lock()
- defer tg.mu.Unlock()
- if len(tg.lns) == 0 {
- // the first listener, listen on the real address
- realPort, err = tg.ctl.portManager.Acquire(proxyName, port)
- if err != nil {
- return
- }
- tcpLn, errRet := net.Listen("tcp", net.JoinHostPort(addr, strconv.Itoa(port)))
- if errRet != nil {
- err = errRet
- return
- }
- ln = newTCPGroupListener(group, tg, tcpLn.Addr())
- tg.group = group
- tg.groupKey = groupKey
- tg.addr = addr
- tg.port = port
- tg.realPort = realPort
- tg.tcpLn = tcpLn
- tg.lns = append(tg.lns, ln)
- if tg.acceptCh == nil {
- tg.acceptCh = make(chan net.Conn)
- }
- go tg.worker()
- } else {
- // address and port in the same group must be equal
- if tg.group != group || tg.addr != addr {
- err = ErrGroupParamsInvalid
- return
- }
- if tg.port != port {
- err = ErrGroupDifferentPort
- return
- }
- if tg.groupKey != groupKey {
- err = ErrGroupAuthFailed
- return
- }
- ln = newTCPGroupListener(group, tg, tg.lns[0].Addr())
- realPort = tg.realPort
- tg.lns = append(tg.lns, ln)
- }
- return
- }
- // worker is called when the real tcp listener has been created
- func (tg *TCPGroup) worker() {
- for {
- c, err := tg.tcpLn.Accept()
- if err != nil {
- return
- }
- err = gerr.PanicToError(func() {
- tg.acceptCh <- c
- })
- if err != nil {
- return
- }
- }
- }
- func (tg *TCPGroup) Accept() <-chan net.Conn {
- return tg.acceptCh
- }
- // CloseListener remove the TCPGroupListener from the TCPGroup
- func (tg *TCPGroup) CloseListener(ln *TCPGroupListener) {
- tg.mu.Lock()
- defer tg.mu.Unlock()
- for i, tmpLn := range tg.lns {
- if tmpLn == ln {
- tg.lns = append(tg.lns[:i], tg.lns[i+1:]...)
- break
- }
- }
- if len(tg.lns) == 0 {
- close(tg.acceptCh)
- tg.tcpLn.Close()
- tg.ctl.portManager.Release(tg.realPort)
- tg.ctl.RemoveGroup(tg.group)
- }
- }
- // TCPGroupListener
- type TCPGroupListener struct {
- groupName string
- group *TCPGroup
- addr net.Addr
- closeCh chan struct{}
- }
- func newTCPGroupListener(name string, group *TCPGroup, addr net.Addr) *TCPGroupListener {
- return &TCPGroupListener{
- groupName: name,
- group: group,
- addr: addr,
- closeCh: make(chan struct{}),
- }
- }
- // Accept will accept connections from TCPGroup
- func (ln *TCPGroupListener) Accept() (c net.Conn, err error) {
- var ok bool
- select {
- case <-ln.closeCh:
- return nil, ErrListenerClosed
- case c, ok = <-ln.group.Accept():
- if !ok {
- return nil, ErrListenerClosed
- }
- return c, nil
- }
- }
- func (ln *TCPGroupListener) Addr() net.Addr {
- return ln.addr
- }
- // Close close the listener
- func (ln *TCPGroupListener) Close() (err error) {
- close(ln.closeCh)
- // remove self from TcpGroup
- ln.group.CloseListener(ln)
- return
- }
|